Advanced Encryption Standard

Results: 1268



#Item
761Data analysis / Image processing / Signal processing / Local regression / Smoothing / Advanced Encryption Standard / Loess / Spline / Function / Statistics / Regression analysis / Time series analysis

Package ‘ggHorizon’ July 2, 2014 Title An implementation of Horizon Graph Description Implements horizon graphs based on ggplot2. Version 0.1 Author Thomas Kern

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:58:53
762Physical Unclonable Function / Advanced Encryption Standard / Entropy / Cryptography / Randomness / Pseudorandom number generators

NIST KMW[removed]Secure Key Storage and True RNG (Rene Struik, September 11, 2012)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:10:44
763UES / DEAL / Cryptography / Data Encryption Standard / Advanced Encryption Standard

A FEDERAL, STATE AND MUNICIPAL PARTNERSHIP Alaska Land Mobile Radio Communications System Encryption

Add to Reading List

Source URL: www.alaskalandmobileradio.org

Language: English - Date: 2009-09-30 17:30:28
764Advanced Encryption Standard / Computing / Radio / Microphone / Sound recording / Headset

Additional Items/Options to Consider/Compare Before Purchasing Radios 1) Transmit power output.

Add to Reading List

Source URL: www.alaskalandmobileradio.org

Language: English - Date: 2009-05-11 17:09:56
765Software bug / Algorithm / Matrix / Advanced Encryption Standard / Mathematics / Applied mathematics / Electronics / Computer / Computing / Simulation

Category: Computer Science

Add to Reading List

Source URL: cusef.byu.edu

Language: English - Date: 2010-07-28 20:00:24
766Internet standards / Secure communication / Transport Layer Security / Symmetric-key algorithm / Public-key cryptography / Block cipher / Advanced Encryption Standard / Cryptographic hash function / Cipher / Cryptography / Cryptographic protocols / Internet protocols

Report on DIMACS∗ Tutorial on Applied Cryptography and Network Security Date of tutorial: August 4 – 7, 2003 Tutorial Organizer: Rebecca Wright, Stevens Institute of Technology Primary Lecturer:

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-02-19 13:05:52
767Cryptographic Module Validation Program / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / SHA-2 / IOS / IPhone / IPad / Cryptographic Module Testing Laboratory / Cryptography / Cryptography standards / Computing

PDF Document

Add to Reading List

Source URL: km.support.apple.com

Language: English - Date: 2013-11-08 14:13:50
768Mobile technology / Advanced Encryption Standard / Secure voice / Two-way radio / Over the Air Rekeying / Motorola / Wireless / Security / Technology / Secure communication / Mobile radio

ALMR Volume 7, Issue 1 January 15, 2013

Add to Reading List

Source URL: www.alaskalandmobileradio.org

Language: English - Date: 2013-01-16 17:30:28
769Message authentication codes / Initialization vector / Block cipher / Block size / Authenticated encryption / Crypto++ / Index of cryptography articles / CBC-MAC / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

04snlntTLraelkFoldernt_Auth_EncTAES-Spec.DVI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:11:01
770EMC Corporation / SecurID / Identity management / One-time password / Two-factor authentication / Password / Access control / Access token / Login / Security / Computer security / Advanced Encryption Standard

Alert[removed]: Incident Prevention and Detection: Protecting Information Security of National Banks

Add to Reading List

Source URL: www.ots.treas.gov

Language: English - Date: 2014-09-28 08:50:31
UPDATE